- Visit SANS, Sophos, SC magazine, and InfoSecurity magazine websites to sign up for news feeds -
22 July 2015 - Fake Android Games Direct Users to Porn Sites
This month five malicious Android apps posing as games made their way into the Google Play store for nearly a week, and during that time each app was downloaded by between 5,000 and 10,000 users, according to new research from Avast.
20 July 2015 - Eight-Year Sentence for Leaking Customer Data
A UK man has been sentenced to eight years in jail for leaking or posting personal information of 100,000 people to the Internet. Andrew Skelton was formerly an internal auditor at the Morrisons supermarket chain and had access to employee data.
16 July 2015 - Ohio Inmate Had Prison System Login Credentials
An Ohio prison inmate was found to be in possession of login credentials for the prison's computer system. A routine search revealed that the prisoner had a list of administrative user names and passwords. The Ohio State Highway Patrol is investigating.
16 July 2015 - US Dept. of Interior IG Report Finds Thousands of Security Issues
According to a report from the US Department of the Interior (DOI) Office of Inspector General, agency systems were found to have nearly
3,000 security issues. Some of the vulnerabilities could be exploited to jump from a compromised machine to internal agency networks. The DOI hosted the Office of Personnel Management (OPM) files that were stolen in the initial, infamous OPM breach.
14 July 2015 - 13-Year Sentence for Man Who Sold Credit Monitoring Records Data
A US federal judge has sentenced Hieu Minh Ngo to 13 years in prison for his role in a data breach of a credit monitoring company that exposed personally identifiable information for 200 million accounts. He was found guilty of charges that included wire fraud and identity fraud. Ngo pretended to be a private investigator and tricked Court Ventures into allowing him to access a database of personal information, which he then sold.
2 July 2015 - FBI Most Wanted Cybercriminals
The FBI has made public a list of its most wanted cyber criminals. For information leading to the capture and prosecution of the top five, the FBI will pay up to a total of US $4.2 million.
2 July 2015 - Former Georgia Pacific Employee Charged with Damaging Computers
A former systems administrator at US paper manufacturer Georgia Pacific has been charged with intentionally damaging the company's protected computers. Brian Johnson is believed to be responsible for "multiple system failures as a result of continued attacks" that began on February 14, 2014, the day he was fired.
29 June 2015 - Malwarebytes Will Trade Pirated License Keys for Legitimate Ones
People who are using counterfeit versions of Malwarebytes antivirus license keys can trade them for legitimate keys that will remain valid for one year. Malwarebytes says that some people may have been tricked into downloading pirated versions of the product.
19 June 2015 - Competition Aims to Identify Cyber Security Talent with $30,000 Scholarships
The SANS Institute's Cyber Aptitude Assessment competition offers top performers scholarships to the SANS Cyber Academy, an eight-week cyber security training boot camp. The assessment consists of roughly 40 questions that competitors will have 45 minutes to answer.
18 June 2015 - Pentagon May Hold IT Users More Accountable for Cyber Security
DOD CIO Terry Halvorsen said that there are few if any consequences for users whose online behavior creates security problems for DOD systems.
Halvorsen said that the Pentagon plans to start holding IT users and their commanders more responsible for violating cyber security rules.
10 June 2015 - 49 Arrested in Phishing Scheme Crackdown
Law enforcement agents in Europe have arrested 49 suspects in connection with a phishing scheme that stole millions of Euros from people's bank accounts. The suspects were arrested in Spain, Poland, and Italy.
Authorities in the UK, Belgium, and Georgia also helped with the investigation, which was dubbed Operation Triangle.
3 June 2015 - FBI Wants Access to Social Media User Information
The FBI wants congress to pass a law mandating that operators of social media sites and other web communication tools share customer information with law enforcement just as telecommunications companies do. Michael Steinbach, assistant director of the FBI's counterterrorism division, told the House Homeland Security Committee earlier this week that congress should develop Internet communication rules that are informed by the Communications Assistance for Law Enforcement Act (CALEA).
26 May 2015 - Android Ransomware
Ransomware targeting users of Android devices pretends to be an update for Adobe Flash Player. Once the user clicks on the phony update, the malware displays what appears to be a warning from the FBI about the user's viewing of online pornography. The warning includes phony screenshots of what appears to be an incriminating browsing history.http://www.theregister.co.uk/2015/05/26/android_ransomware_mobile_scam_fbi/
21 May 2015 - Password Security Questions Easy to Guess
Google's analysis of hundreds of millions of password security questions found that it would be easy for people intent on gaining access to someone's account to do so. Guesses yielded correct results a surprising amount of the time. Google says that instead of adding more questions, but to update account information to provide a phone number or secondary email address to help prevent accounts from being taken over.
21 May 2015 - Android Factory Reset Does Not Always Clear Data
Researchers at Cambridge University have found that as many as 500 million Android phones contain a security issue that could expose data even after the factory reset option is run. The researchers were able to recover data, including login credentials, text messages, and emails, from supposedly wiped devices http://arstechnica.com/security/2015/05/flawed-android-factory-reset-leaves-crypto-and-login-keys-ripe-for-picking/
15 May 2015 - Medical Management LLC Breach Affects Patients in at Least Three States
Grand View Health in Pennsylvania has issued a notice stating that a third party medical billing company, Medical Management, LLC (MML), has alerted them that a former employee copied patient data and may have shared them with other individuals. The breach affects hospitals in at least three states: Pennsylvania, New Jersey, and New York. MML is in the process of notifying affected individuals. The employee who allegedly took the data worked at MML from February 2013 to March 2015.
14 May 2015 - FBI: Data Breaches Up 400%; Workforce Needs To Be "Doubled or Tripled"
James Trainor, acting assistant director of the FBI's Cyber Division, said the agency used to learn about a new, large-scale data breach every two or three weeks. "Now, it is close to every two to three days,"
Trainor also said the cybersecurity industry needs to "double or triple"
its workforce in order to keep up with hacking threats.
11 May 2015 - Thieves Steal Funds Through Starbucks Mobile App
Thieves are exploiting a weakness in Starbucks' mobile app to steal money from users' bank accounts. The app can be used to pay at the coffee stores' checkouts with smartphones and can also be set up to draw money from payment accounts to reload gift cards. The attackers have reportedly been breaking into Starbucks accounts to transfer money from bank accounts using the app's auto-reload function. Thieves need only the username and password to access the accounts. Starbucks says their system has not been breached, but that the attacks are the result of breaches of access credentials elsewhere and affect people who reuse that information on multiple sites. Consumer advocate Bob Sullivan urges users to disable the auto-reload function.https://bobsullivan.net/cybercrime/identity-theft/exclusive-hackers-target-starbucks-mobile-users-steal-from-linked-credit-cards-without-knowing-account-number/#
11 May 2015 - Former Dept. of Energy Employee Indicted for Alleged Phishing Attack
A man who used to work for the US Department of Energy (DOE) and the Nuclear Regulatory Commission (NRC) has been indicted on charges that he launched a spear phishing campaign against DOE employees. Charles Harvey Eccleston allegedly sent the phishing messages in January 2015. He allegedly intended to infect the DOE's network with malware that would steal information about US nuclear weapons for a foreign country.
8 May 2015 - Malvertising Attack Targets Adult Website Visitors
Computers belonging to people who have visited popular adult content websites were infected by malicious advertisements through Flash exploits. The malicious ad attempts to drop malware on site visitors'
computers with no user interaction. The ad does not redirect users to another website, but instead drops the malware itself.
9 April 2015 - Incredible: Hacked French Network Exposed Its Own Passwords During TV Interview
In an interview about the satellite hack, TV5Monde reporter David Delos unwittingly revealed at least one password for the station's social media presence. He was filmed in front of a staffer's desk- showing sticky notes and taped index cards that were showed account usernames and passwords.
13 April 2015 - Middle School Student Facing Felony Charge for Accessing School's Network
A 14-year-old middle school student in Florida is facing a felony charge for accessing his school's computer network and changing a teacher's wallpaper. The school district's sets passwords to teachers' last names.
The student had previously been suspended for three days for accessing the system without authorization.
8 April 2015 - AT&T to Pay US $25 Million Settlement Over Call Center Data Theft
The US Federal Communications Commission (FCC) has reached a settlement with AT&T for data breaches that compromised customer information at call centers in Mexico, Colombia, and the Philippines. The telecommunications company will pay US $25 million. The incidents, which occurred in 2013 and 2014, affected 280,000 people. Some of the call center employees used their access to systems to steal information that could be used to request codes to unlock stolen phones. AT&T has stopped doing business with the call centers in question.
28 March 2015 - Army Security Awareness Message Addresses Online Security Issues
The US Army has issued a security awareness message urging its troops and their families to take steps to protect themselves from extremist attacks. The advice includes being careful about what they post to Twitter, Facebook, and other social media and refraining from including any geolocation data in posts. The message also lists physical security tips, including installing heavy-duty locks and doors and using window security systems.
25 March 2015 - NJ School District Recovers From Ransomware Attack
A New Jersey school district's network was held hostage by ransomware.
Those behind the attack demanded 500 Bitcoins ($126,400) for full restoration. While students, teachers, and staff were inconvenienced by not being able to access their files for several days, eventually most files were restored from the network's backup system, and servers are being put back online after being scrubbed of malware. Student data were unaffected as they are stored elsewhere. The New Jersey State Police and the FBI are investigating.
17 March 2015 - NYPD Officer Arrested for Allegedly Accessing Databases Without Authorization
A New York City Police Department officer has been arrested for allegedly breaking into restricted law enforcement databases to obtain personal information about people who had been involved in traffic accidents. Auxiliary Deputy Inspector Yehuda Katz allegedly called these people, pretending to be an attorney.
11 March 2015 - VICEPASS Malware Targets Home Routers
Malware dubbed VICEPASS connects to home routers, scans for connected devices, and sends harvested information to a command-and-control server before it deletes itself. The malware appears to be infecting users who are tricked into visiting malicious sites that claim to offer Adobe Flash updates.
9 March 2015 - Former Employee Pleads Guilty to Breaking Into Former Employer's Network
A man who used to work at a New York company has pleaded guilty to breaking into his former employer's network and causing damage. Michael Meneses left his job at a high-voltage power supply manufacturer in January 2012 after three-and-a-half years of employment. Before he left, he had created a program to steal other employees' login credentials.
He used that information to gain access to the network and altering code to cause problems with work order cost calculations.
19 February 2015 - Many Companies Still Not Focusing on Cyber Security
Although it would seem likely that incidents like the Target and Sony breaches would prompt organizations to take their own cyber security more seriously, results from two separate surveys indicate that there appears to be "a disconnect ... between the security function and senior leadership at many companies." A survey from Raytheon asked 1,006 CIOs, CISOs, and other technology executives about practices at their companies. Seventy-eight percent said their boards had not been briefed about cyber security strategy within the past 12 months. A PricewaterhouseCoopers (PwC) survey conducted last year found that less than 42 percent of responding companies' boards actively participate in security strategy. However, a forthcoming IDC survey of 269 security professionals found that most said their organizations have recently begun paying closer attention to their security postures.
11 February 2015 - Smartphone Thefts Down After Kill Switch Implemented
Authorities in three major cities say that kill switches on smartphones have noticeably reduced thefts of the devices. Apple added the feature in 2013, and since that time, iPhone thefts have dropped by 25 percent in New York, by 40 percent in San Francisco, and by 50 percent in London. Overall cellphone thefts in that period fell by 16 percent in New York, and 27 percent in San Francisco. The decline in thefts in London overall was 50 percent.
3 February 2015 - Three Apps Laced with Malicious Adware Pulled from Google Play Store
Google has removed three apps that were found to contain malicious adware from the Google Play store. The apps have been downloaded millions of times. One is a solitaire game aimed at English-speaking users. The other two, which targeted Russian-speaking users, are an IQ test and a history app. The malicious activity begins 30 days after the app is installed. When users unlock their phones, ads are displayed telling them the devices are out of date, infected or otherwise at risk, and are directed to malicious sites.
29 January 2015 - UK Government Disks Lost in the Mail Contain Sensitive Data
The UK government has acknowledged that two computer disks containing sensitive information related to high-profile judicial inquiries have been lost in the post.
15 January 2015 - LinkedIn Account Credentials Targeted in Phishing Scheme
Attackers are using phony security alerts to steal LinkedIn account access credentials. The messages pretend to come from LinkedIn support staff saying that users must download an attachment that will tell users how to install an update. The attachment appears to be the LinkedIn website but it sends entered data to the attackers. Users can protect themselves by activating LinkedIn's two-factor authentication.
14 January 2015 - Military Social Media Security
The US Office of the Secretary of Defense has instructed its social media managers to ensure that their accounts are secure, days after the Twitter and YouTube accounts of Centcom were hijacked. The compromised accounts were back online under Centcom control on Monday night, January 12.
9 January 2015 - Dept. of Energy Offers Cybersecurity Guidance
The US Department of Energy has released voluntary guidelines for energy companies and utilities to help them decide what steps to take to improve their cyber security posture. The Energy Sector Cybersecurity Framework Implementation Guidance offers ideas for developing risk management strategies and implementing best practices.
5 January 2015 - Morgan Stanley Employee Fired Over Alleged Customer Data Theft
Morgan Stanley has fired an employee for allegedly stealing customer data, including account access credentials, and offering them for sale online. The breach affected approximately 10 percent of the company's
3.5 million wealth management customers. The employee had worked at Morgan Stanley since 2008.